Intel to Patch All Chips With Meltdown, Spectre Flaws By End of January

Intel (as well as other chipmakers) have been under fire for the critical CPU security flaws, namely Spectre and Meltdown, over the previous week. So, at its much-awaited CES 2018 press conference in Las Vegas, Intel’s CEO Brian Krzanich decided to address this industry-wide problem before kicking off the product announcements.

“I want to take a moment to thank the industry for coming together for another purpose – to address the recent security research findings reported as Meltdown and Spectre, said Intel CEO Brian Krzanich”

Taking center stage at the event, Krzanich vowed that close to 90% of the affected chips, which were produced in the last five years, will receive an update to fix the Meltdown and Spectre security flaws by the end of this week. The remaining 10% of the processors are expected to be safeguarded against any attacks by the end of January.

To offer some respite to consumers amid all the mass panic, Intel’s CEO assured that there hasn’t been any reported use of the security flaws to swiftly steal user info in the wild. He’s further added that the security patches may impact your system’s performance, but it will essentially be highly dependent on the workload.

While Meltdown enables the hackers to access all your unreadable system data, including personal info and passwords, Spectre is suspected of having a more severe impact on the security of an individual. It allows the hackers to isolate and trick error-free programs into a fluid mechanism for leaking all your personal info. Thus, Intel has rightly said that,

“The best thing you can do to make sure your data remains safe is to apply any updates from your operating system vendor and system manufacturer as soon as they become available.”

Ultimately, this means almost every consumer who owns an Intel-powered laptop or PC is going to be protected against the severe flaws by the end of this month. Until then, major tech giants, such as Microsoft, Google, Apple, and many others, have already rolled out a set of updates to patch the vulnerabilities. You should immediately install those to protect the leakage of your private info into the hands of malicious actors.